Analysis
-
max time kernel
176s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 16:51
Static task
static1
Behavioral task
behavioral1
Sample
Bank Swift.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Bank Swift.exe
Resource
win10v2004-20221111-en
General
-
Target
Bank Swift.exe
-
Size
830KB
-
MD5
aacbef36fa202e5eb1512c99022ef31c
-
SHA1
97a12e69a35a037f34bbd4b4d779326bdb99ac7e
-
SHA256
4d4be5a0fb152cb0f795f6ce36b1b3e4e69234681e36c41f3760858b4d38aa31
-
SHA512
5648dbe1a6c3f6aef53b1c14ba50b3837c2671a00934a0c3049d31711b6e61f972b2d7b1b3531ea6db671e0a22ec208759e1aa0547ce5cf4e906a201756dc84a
-
SSDEEP
24576:Cw/HDtU376CVtv1ekon6imVSE/HHkFg/IyXtrpc:o3tv1jftfkoXVp
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1644755040:AAGRTnph6BdO8-t1bJaOyVu9aeuJErmisqs/sendMessage?chat_id=1637651323
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2448-140-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Bank Swift.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation Bank Swift.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 58 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Bank Swift.exedescription pid process target process PID 2528 set thread context of 2448 2528 Bank Swift.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Bank Swift.exeRegSvcs.exepid process 2528 Bank Swift.exe 2448 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Bank Swift.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 2528 Bank Swift.exe Token: SeDebugPrivilege 2448 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Bank Swift.exedescription pid process target process PID 2528 wrote to memory of 4396 2528 Bank Swift.exe schtasks.exe PID 2528 wrote to memory of 4396 2528 Bank Swift.exe schtasks.exe PID 2528 wrote to memory of 4396 2528 Bank Swift.exe schtasks.exe PID 2528 wrote to memory of 2448 2528 Bank Swift.exe RegSvcs.exe PID 2528 wrote to memory of 2448 2528 Bank Swift.exe RegSvcs.exe PID 2528 wrote to memory of 2448 2528 Bank Swift.exe RegSvcs.exe PID 2528 wrote to memory of 2448 2528 Bank Swift.exe RegSvcs.exe PID 2528 wrote to memory of 2448 2528 Bank Swift.exe RegSvcs.exe PID 2528 wrote to memory of 2448 2528 Bank Swift.exe RegSvcs.exe PID 2528 wrote to memory of 2448 2528 Bank Swift.exe RegSvcs.exe PID 2528 wrote to memory of 2448 2528 Bank Swift.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bank Swift.exe"C:\Users\Admin\AppData\Local\Temp\Bank Swift.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rUVcgRH" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA24B.tmp"2⤵
- Creates scheduled task(s)
PID:4396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aa5241e203f29cca7f67aae13c1d025d
SHA1320fd4a664643b53ff37fda67ba60d6c366cc75b
SHA2563be4bc4cee79a125fccb09d17b65527925a737a779cba5058c3cefa2f6cc3c04
SHA512f1376753a6dc64d8452df6e9d178b9f7c52e8e303e69e67f8720fb06178ada74bdbda80d2cd9925eb8a66dc730e3dc135e0b1286efebd092dd126fc8e257fc62